Sciweavers

CORR
2012
Springer
176views Education» more  CORR 2012»
14 years 12 days ago
Capturing Topology in Graph Pattern Matching
Graph pattern matching is often defined in terms of subgraph isomorphism, an np-complete problem. To lower its complexity, various extensions of graph simulation have been consid...
Shuai Ma, Yang Cao, Wenfei Fan, Jinpeng Huai, Tian...
CORR
2012
Springer
198views Education» more  CORR 2012»
14 years 12 days ago
Lipschitz Parametrization of Probabilistic Graphical Models
We show that the log-likelihood of several probabilistic graphical models is Lipschitz continuous with respect to the ￿p-norm of the parameters. We discuss several implications ...
Jean Honorio
CORR
2012
Springer
229views Education» more  CORR 2012»
14 years 12 days ago
Resource Allocation with Subcarrier Pairing in OFDMA Two-Way Relay Networks
Abstract—This study considers an orthogonal frequencydivision multiple-access (OFDMA)-based multi-user two-way relay network where multiple mobile stations (MSs) communicate with...
Hao Zhang, Yuan Liu, Meixia Tao
CORR
2012
Springer
194views Education» more  CORR 2012»
14 years 12 days ago
A Graph Theoretical Approach to Network Encoding Complexity
Consider an acyclic directed network G with sources S1, S2, . . . , Sl and distinct sinks R1, R2, . . . , Rl. For i = 1, 2, . . . , l, let ci denote the min-cut between Si and Ri....
Li Xu, Weiping Shang, Guangyue Han
CORR
2012
Springer
197views Education» more  CORR 2012»
14 years 12 days ago
Crowdsourcing with Endogenous Entry
Arpita Ghosh, R. Preston McAfee
CORR
2012
Springer
188views Education» more  CORR 2012»
14 years 12 days ago
A Logical Characterization of Constraint-Based Causal Discovery
We present a novel approach to constraintbased causal discovery, that takes the form of straightforward logical inference, applied to a list of simple, logical statements about ca...
Tom Claassen, Tom Heskes
191
Voted
CORR
2012
Springer
281views Education» more  CORR 2012»
14 years 12 days ago
Belief Propagation by Message Passing in Junction Trees: Computing Each Message Faster Using GPU Parallelization
Compiling Bayesian networks (BNs) to junction trees and performing belief propagation over them is among the most prominent approaches to computing posteriors in BNs. However, bel...
Lu Zheng, Ole J. Mengshoel, Jike Chong
CORR
2012
Springer
203views Education» more  CORR 2012»
14 years 12 days ago
Constant Factor Lasserre Integrality Gaps for Graph Partitioning Problems
Venkatesan Guruswami, Ali Kemal Sinop, Yuan Zhou
CORR
2012
Springer
178views Education» more  CORR 2012»
14 years 12 days ago
Q- and A-learning Methods for Estimating Optimal Dynamic Treatment Regimes
Phillip J. Schulte, Anastasios A. Tsiatis, Eric B....
CORR
2012
Springer
198views Education» more  CORR 2012»
14 years 12 days ago
Token-DCF: An Opportunistic MAC protocol for Wireless Networks
—IEEE 802.11 DCF is the MAC protocol currently used in wireless LANs. 802.11 DCF is inefficient due to two types of overhead; channel idle time and collision time. This paper pr...
Ghazale Hosseinabadi, Nitin H. Vaidya